{"version":"1.0","provider_name":"TechSolutions, Inc.","provider_url":"https:\/\/www.techsolutionsinc.com","author_name":"TechSolutions","title":"What do an 11ft ladder, Bounty Hunters, Border Patrol Agents, and Smarter Villagers have to do with Cybersecurity?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jaeGZX2wuI\"><a href=\"https:\/\/www.techsolutionsinc.com\/blog\/what-do-an-11ft-ladder-bounty-hunters-border-patrol-agents-and-smarter-villagers-have-to-do-with-cybersecurity\/\">What do an 11ft ladder, Bounty Hunters, Border Patrol Agents, and Smarter Villagers have to do with Cybersecurity?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.techsolutionsinc.com\/blog\/what-do-an-11ft-ladder-bounty-hunters-border-patrol-agents-and-smarter-villagers-have-to-do-with-cybersecurity\/embed\/#?secret=jaeGZX2wuI\" width=\"600\" height=\"338\" title=\"&#8220;What do an 11ft ladder, Bounty Hunters, Border Patrol Agents, and Smarter Villagers have to do with Cybersecurity?&#8221; &#8212; TechSolutions, Inc.\" data-secret=\"jaeGZX2wuI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"by Rich Kenney, Vice President, TechSolutions, Inc. The answer is everything! &#8230;\u00a0 if you really want to better understand the new type of IT defense that is now available to protect your business from increasingly aggressive cyberthieves.\u00a0 The characters will help you quickly figure out how to protect your firm. Cybersecurity is your defense against [&hellip;]"}